This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The post Report finds women are declining CISO/CSO roles appeared first on TechRepublic. Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture.
[no description provided] 20 Ways to Make AppSec Move at the Speed of DevOps [link to [link] no longer works] is in CSO. Update: Cant find it on CSO, [link] Its a good collection, and Im quoted.
Thoughts on Mark Rasch's essay, Conceal and Fail to Report - The Uber CSO Indictment Mark Rasch, who created the Computer Crime Unit at the United States Department of Justice, has an essay, " Conceal and Fail to Report - The Uber CSO Indictment."
The post Former Uber CSO found guilty of obstruction in attempted data breach cover-up appeared first on TechRepublic. Joe Sullivan schemed to hide a 2016 breach of 57 million users’ information shortly after he was hired.
Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear.
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not that these roles are somehow more or less important than that of a CISO/CSO within the organization.
However, CSO's investigation shows that the bug bounty platforms have turned bug reporting and disclosure on its head, what multiple expert sources, including HackerOne's former chief policy officer, Katie Moussouris, call a "perversion." [.]. Leitschuh, the Zoom bug finder, agrees.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
million people was exposed in a data breach lasts year, prompting AppOmni CSO Cory Michal to say that data collection companies like DISA and National Public Data need more oversight, regulations, and penalties. The post DISA Breach Highlights Need for Stronger Oversight: AppOmni CSO appeared first on Security Boulevard.
Get the latest from CSO by signing up for our newsletters. ]. ISACs also facilitate the sharing of data between public and private sector groups. Learn what you need to know about defending critical infrastructure. |
Guest expert: Scott Gerlach, CSO, StackHawk We had a great conversation about how the venerable “ shift left ” security philosophy is being refined so that it better aligns with the way software gets developed today – at light speed.
Out of an abundance of caution, we replaced our RSA SSH host key used to secure Git operations for GitHub.com,” GitHub CSO and SVP. In an attempt to get ahead of fallout from the exposure of its private SSH key in a public repository, the software development platform GitHub proactively rotated its host key last week.
Den Jones shares his perspective as a CSO on the recent Okta breach, and what that means for the broader security community. The post CSO’s Perspective: The Okta Breach and What It Means to the Broader Community first appeared on Banyan Security.
In 2019, a CSO article raised the question “ Insider risk management — who’s the boss ?” Over the years I have hypothesized that where such IRM programs reside within an organization will have a material impact on its focus and possibly its overall effectiveness.
About the essayist: Den Jones, CSO at Banyan Security , which supplies s imple, least-privilege, multi-cloud application access technologies. Food for thought, eh!
RELATED: Uber CSO Found Guilty: The Sky Is Not Falling. Similarly, SolarWinds and its Chief Information Security Officer faced fraud and internal control failure charges from the SEC. These incidents underscore the critical importance of effective governance in cybersecurity programs.
It is not a book for the CSO. I'm giving little away by saying the twist is that attackers do innovate, and it's a surprisingly solid frame on which Kip hangs a readable and actionable book for executives who need to make cybersecurity decisions. And it doesn't fall into the jargon trap either in security or management.
As Diana Kelley, CSO and CISO at Cybrize notes, “it’s not about giving up, it’s about being better prepared.” If threats do compromise your business, time is of the essence when it comes to detection, response, and recovery. The longer an organization is unable to operate normally, the more at risk it becomes for damaging financial losses.
If you would like to learn more about PQC, SecureWorld recently hosted a Remote Sessions broadcast in which Keyfactor CSO Chris Hickman offered an in-depth primer on PQC fundamentals for practical application. You may view the session on-demand here. Follow SecureWorld News for more stories related to cybersecurity.
[RELATED: Suing the CISO: SolarWinds Fires Back ] Shawn Tuma, Co-Chair, Data Privacy & Cybersecurity Practice, at Spencer Fane, LLP and frequent SecureWorld instructor and speaker, offered this perspective: "The law evolves in incremental steps and, in my opinion, what this shows is a very early in developing—yet consistent—trend toward trying (..)
Glenn Kapetansky, CSO and Technology Lead at Trexin, had this to say about Bogac, whom he knows well: "I know Amy Bogac both professionally and personally, and she is well regarded in both circles.
“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!
A: Arlan McMillian —now CSO at Kirkland & Ellis LLP—was one of my early mentors and helped me understand what it took to be a leader in the cyber community and profession. Q: In honor of our 2024 conference theme, Legacies Untold: Revealing Cybersecurity's Hidden Figures , who is someone that you consider to be a Cyber Hero?
And the recent clarifications—focusing on material cybersecurity incidents—is a step in the right direction," said Glenn Kapetansky , CSO, Trexin Group. "In "The SEC's intent in their latest cybersecurity incident disclosure rules—to enhance transparency for investors—is good.
The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
For more information about recent ransomware trends and incidents: Ransomware: Predictions and Actions in 2025 (SC Magazine) New ransomware group Funksec is quickly gaining traction (CSO) Ransomware isn't always about the money: Government spies have objectives, too (Dark Reading) Ransomware isn't always about the money: Government spies have (..)
At that time generative AI was not a major consideration and novel privacy-preserving techniques (PPT) were not featured heavily on a CSO 5yr budgetary plan. The world has changed. The responsible use of GenAI, and adoption of PPT play a crucial role in aligning with DORA legislation while safeguarding sensitive data.
Understanding the nature of the threat and how to appropriately mitigate that risk should be a shared responsibility, not solely the purview of the CISO or CSO. I would think that boards would want to have that experience, even though it is somewhat difficult to come by.
In addition, 15 of today’s most successful business leaders back the company, including Olivier Pomel, Co-founder and CEO at Datadog; Pankaj Patel, Co-founder and CEO at Nile; Diogo Monica, Co-founder and CEO at Anchorage Digital; Joe Sullivan, former CSO at Facebook, Uber and CloudFlare; Bharat Shah, former CVP of Microsoft Security; Suresh Batchu, (..)
For more information about CISO trends: “ 6 ways the CISO role is evolving today ” (CSO) “ Why the CISO role is so demanding – and how leaders can help ” (IT Pro) “ How to land a corporate board seat as a CISO ” (TechTarget) “ How to ensure cybersecurity strategies align with the company’s risk tolerance ” (CSO) “ CISOs Struggle for C-Suite Status (..)
RELATED: Uber CSO Found Guilty: The Sky Is Not Falling. Having dedicated privacy personnel helps centralize expertise, authority, and accountability. " Jaworski added.
I really respect Dave Kennedy, who is an extremely successful member of the security community having started two security companies after being a CSO himself. A: Maybe obvious, but the first "hackers" I ever saw was Kevin Mitnick (RIP). Q: Lastly, what are you most looking forward to at your regional SecureWorld conference this year?
“The software supply chain issues identified … in OpenAI’s breach are not surprising, as most organizations are struggling with these challenges, albeit perhaps less publicly,” said Peter Morgan, who is the co-founder and CSO of Phylum.io, a cybersecurity firm that focuses on the supply chain.
CISA advisor Nicole Perlroth closed out ISC2 Security Congress’ keynotes with a wake-up call for security teams to watch for nation-state-sponsored attacks.
“The most significant risk for enterprises isn’t the speed at which they are applying critical patches; it comes from not applying the patches on every asset,” noted Brian Contos, CSO of Sevco Security. The simple fact is that most organizations fail to maintain an up-to-date and accurate IT asset inventory.”
Sevco’s CSO Brian Contos states, “6% of all IT assets have reached EOL, and known but unpatched vulnerabilities are a favorite target for attackers.” The fix: D-Link recommends its retirement and replacement due to the DAP-2310’s End-of-Life (EOL) status.
Developing a Clear Cybersecurity Strategy As a CISO/CSO, creating and presenting a clear cybersecurity strategy to the board of directors is crucial in fostering awareness of cyber risks and encouraging investment in cybersecurity defense.
I came across an interesting blog post over at Finextra which got me thinking about a topic that has been in the back of my. The post Cloud computing concentration and systemic risk appeared first on Security Boulevard.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. This phenomenon is not just anecdotal; several studies have highlighted the alarming prevalence of burnout in the cybersecurity industry.
Th e 8th biennial Deloitte-NASCIO Cybersecurity Study reveals a rapidly evolving cybersecurity landscape, with artificial intelligence (AI) and generative AI (GenAI) introducing new challenges. Conducted in spring 2024, the study captures insights from Chief Information Security Officers of all 50 U.S.
Embrace the challenges of cybersecurity leadership For many of us in the security industry, it ' s the pinnacle of our career. You ' ve worked in the trenches. You've worked your way up, taking on bigger projects and teams. You've built your network. You've gone to events and dinners.
On July 18th, a significant ruling came from a New York federal judge who dismissed most of the claims brought by the U.S. Securities and Exchange Commission (SEC) against SolarWinds Corp. and its Chief CISO, Timothy G.
Having helped build out many SecureWorld conferences, I have come to realize—likely to no one's surprise—that the best cybersecurity leaders indeed have some technical prowess, but it is their soft skills that make them exceptional leaders.
A global sensation since its initial release at the end of last year, ChatGPT 's popularity among consumers and IT professionals alike has stirred up cybersecurity nightmares about how it can be used to exploit system vulnerabilities.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content